From Hack to Response to Training: Unif...
An employee clicks on a phishing email, leading to a hack that compromises the organization’s systems. Witness the attack unfold from multiple perspectives — the attacker, the SOC and the employee. Then see firsthand how human risk management can pinpoint vulnerabilities like this and strengthen your defenses to reduce risk. With a unified approach, your organization can tackle a shared goal: reducing cyber risk through in-the-mome...
April 22, 2025
Organizer:
Infosec Location:
Webcast
Government Contracting Conference
In your role as a government contracting executive, keeping pace with the ever-evolving government contracting compliance rules, regulations, and oversight can be daunting. We've designed this program to help understand the changes made over the past year to the contracting rules and regulations. This will help you gauge the risks you need to be aware of as you lead your organization forward and provide best practices to help overcome those ri...
April 22, 2025
Organizer:
FORVIS Location:
Reston, VA
Google Cloud Public Sector Apigee Roads...
Explore the transformative potential of AI within the public sector and how APIs are crucial for its successful implementation. We will explore: Google's State of AI: Learn about Google's latest AI advancements and strategic direction. AI in Government: Focusing on AI solutions to improve public services and efficiency. APIs: Powering Grounded AI & Democratizing Usage: Enabling powerful, reliable AI models and expanding access thro...
BeyondTrust's Securing Paths to Privile...
Join BeyondTrust and your peers for a Lunch and Learn on April 22 from 12:30-2:30pm ET at the Tobacco Road Sports Cafe in Raleigh, North Carolina. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern ide...
Get to Know K12 SIX: Your Partner in K-...
In today's landscape, K-12 schools face an escalating barrage of cyberattacks, with over 1,600 publicly disclosed incidents since 2016, from crippling ransomware to devastating data breaches. The vital defense against these growing threats lies in collective action. Join the K12 Security Information eXchange (K12 SIX), the nation's K-12 ISAC, to gain real-time threat intelligence, peer collaboration, and access to K-12-specific resources devel...
April 22, 2025
Organizer:
K12 Six Location:
Webcast
Securing Federal Missions with Efficiency
State and local government agencies are managing more data than ever—while facing tight budgets, security threats, and evolving compliance requirements. How can your organization cut costs, eliminate inefficiencies, and improve resilience while staying aligned with key industry initiatives? Join us for an exclusive webinar exploring how these technologies help agencies cut storage costs by up to 80%, streamline data management, and enhan...
Evolving Your Risk Management Strategy...
Artificial Intelligence (AI) is revolutionizing IT systems, rapidly becoming essential for organizations of all sizes. AI risks differ by industry, organization, country, business problem, and complexity. Managing these risks is crucial for user and data security. Join Charles Cresson Wood, author of Internal Policies for Artificial Intelligence Risk Management, and Illena Armstrong, President of Cloud Security Alliance, for a discussion on AI...
How to Succeed at Agentic AI with Trust...
Join Eoghan Casey and Mark Wigham from Salesforce for an in-depth webinar on maintaining trusted and resilient data to deploy AI at scale. We will explore the essential steps to ensure that AI Agents have access to the data they need, don’t have access to data they shouldn’t, and perform optimally. Key topics include:Trusted Agentic AI: Understand how to implement robust data security measures to control and track what data Agents...
The Future of CPS Protection: A Gartner...
The 2025 GartnerŪ Magic Quadrant™ for CPS Protection Platforms (CPS PP) was recently published, in which providers are evaluated based on Completeness of Vision and Ability to Execute. Recognized as a Leader in the report, we believe Claroty has a clear point of view on the evolution of the market and the needs of asset-intensive enterprises when it comes to securing their CPS. In this webinar, we will provide attendees a “look beh...
April 22, 2025
Organizer:
Claroty Location:
Webcast
Finding Your Best Strategy for a Multi-...
One consideration for state CIOs is whether to maintain a multi-cloud environment. Having more than one cloud provides the opportunity for state agencies to pick and choose among the different providers for the best fit to meet their needs – but running multiple clouds can be expensive and technically challenging to manage. Learning Objectives: Identify the various criteria that define the differences between CSPs and how agencies can ap...
April 22, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.